EP3086252B1 - Authentication system and authentication method - Google Patents
Authentication system and authentication method Download PDFInfo
- Publication number
- EP3086252B1 EP3086252B1 EP14871128.6A EP14871128A EP3086252B1 EP 3086252 B1 EP3086252 B1 EP 3086252B1 EP 14871128 A EP14871128 A EP 14871128A EP 3086252 B1 EP3086252 B1 EP 3086252B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- controller
- crl
- information
- server
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 56
- 230000008569 process Effects 0.000 claims description 33
- 238000012545 processing Methods 0.000 description 84
- 238000003860 storage Methods 0.000 description 70
- 238000010586 diagram Methods 0.000 description 53
- 238000004891 communication Methods 0.000 description 49
- 238000012795 verification Methods 0.000 description 21
- 238000004590 computer program Methods 0.000 description 14
- 102000036364 Cullin Ring E3 Ligases Human genes 0.000 description 9
- 108091007045 Cullin Ring E3 Ligases Proteins 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 5
- 230000010354 integration Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000006872 improvement Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- NRNCYVBFPDDJNE-UHFFFAOYSA-N pemoline Chemical compound O1C(N)=NC(=O)C1C1=CC=CC=C1 NRNCYVBFPDDJNE-UHFFFAOYSA-N 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000009826 distribution Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Definitions
- the present disclosure relates to an authentication system that enables a device and controller to be safely connected.
- a controller is installed in the home, and transmission of history information from the home electric appliance devices to a manufacturer's server is relayed through the controller. Setting the connection between the controller and the home electrical appliances so as to be safe enables communication within the home to be controlled, and leakage of information over wireless communication and connection to the in-home network by spoofing to be prevented.
- Wi-Fi Protected Setup NPL 1
- Wi-Fi wireless connection this only guarantees interconnection among devices at an access point of devices and home electric appliances, that is equivalent to a controller, and does not guarantee whether a connecting device is valid or not.
- NPL 2 Usage of the Public Key Infrastructure (PKI) to authenticate the validity of devices has been conventionally known (NPL 2).
- PKI Public Key Infrastructure
- NPL 2 Authentication based on PKI guarantees the validity of devices by authenticating that an entity (home electric appliance or controller) has a secret key and a public key certificate issued by a certificate authority. Once there is an occurrence of leakage of a secret key or the like regarding a public key certificate, the public key certificate needs to be revoked in order to prevent unauthorized use of the public key certificate.
- a representative way to revoke a public key certificate is a CRL (Certificate Rvocation List) (NPL 2) which is a list of certificate revocations.
- a CRL is a list of revoked public key certificates, with IDs and the like of revoked public key certificates affixed with the signature of the certificate authority that has issued the public key certificate, and distributed.
- the entity such as the home electric appliance or controller verifies whether the public key certificate of another entity to which it is to connect is not listed in the CRL. Accordingly, the newest CRL needs to be used as the CRL.
- An authentication method is authentication method in an authentication system including a server, a device, and a first controller that controls the equipment.
- the authentication method includes:
- the home electric appliance acquires the CRL via the controller. At this time, if the controller is an unauthorized device, even of the public key certificate is listed in the CRL, the home electric appliance will authenticate the controller as an authorized device unless the controller distributes a CRL, in which the public key certificate of the controller is listed, to the home electric appliance.
- An authentication method is an authentication method in an authentication system including a server, a device, and a first controller that controls the device, the authentication method including:
- the server references information about the certificate revocation list attached to the equipment history information from the device, and thus is able to judge that the controller is unauthorized.
- an unauthorized controller not registered in the certificate revocation list may be detected, and unauthorized control of device via the unauthorized controller may be prevented reliably.
- the server when the server judges that the first controller is unauthorized, the server transmits the second certificate revocation list to a second controller connected to the device, the second controller transmits the second certificate revocation list to the device, and the device updates the first certificate revocation list with the second certificate revocation list.
- the device is configured to be connected to a first controller and a second controller, so that even if the first controller is unauthorized, the server is able to distribute an up-to-date certificate revocation list to the device via the second controller, and cause the certificate revocation list to be updated.
- the server when the server judges that the first controller is unauthorized, the server records unauthorized determination information indicating that the first controller is unauthorized, and when there is a process request from the first controller, references the unauthorized determination information, and does not perform the process request from the first controller.
- the server when the server judges that the first controller is unauthorized, the server transmits the second certificate revocation list to the device, and the device updates the first certificate revocation list with the second certificate revocation list.
- an up-to-date certificate revocation list may be distributed from the server to the device without going through the first controller, and the certificate revocation list in the equipment may be updated.
- Fig. 1 is a diagram illustrating the overall configuration of the authentication system 10 according to the present disclosure.
- the authentication system 10 is configured including controllers 100, devices 200, servers 300, and a portal server 400.
- the controllers 100a to b are devices having functions of controlling devices.
- the controllers 100a to b also have functions of connecting to servers, transmitting information of home electric appliances to the server, receiving control requests from the servers, controlling the home electric appliances, and so forth.
- the devices 200a through c are home electric appliances and housing facility devices that collect device history information, such as televisions, recorders, air conditioners, refrigerators, batteries, and so forth.
- the servers 300a through c are a content server that distributes content, a manufacture server of a manufacturer that manufactures home electric appliances, and a service server of a service provider that provides services.
- history information of a device in the home is transmitted to the controller, and the control transmits history information of the device to the manufacturer server.
- the service server is an electric power company
- the electric power company connects to the controller via a home smart meter (omitted from illustration).
- the controller controls devices in the home based on electric power information from the electric power company, and suppresses consumption of electric power within the home.
- Fig. 2 is a configuration diagram of the controller 100a.
- the controller 100a is configured including a device management unit 101, a device information storage unit 102, an authentication processing unit 103, an authentication information storage unit 104, and a communication unit 105.
- the controller 100b also is of the same configuration.
- the device management unit 101 manages devices connected to the controller. In a case where there is a connection request from a device, the device management unit 101 transmits the public key certificate received from the device to the authentication processing unit 103, and requests authentication processing. The device management unit 101 receives the authentication results from the authentication processing unit 103. In a case where authentication has been successful, the device management unit 101 registers the device ID and certificate ID in a connecting device management table held at the device information storage unit 102.
- the device information storage unit 102 manages information of devices connecting to the controller.
- Fig. 3 is a diagram illustrating an example of a device information management table which the device information storage unit 102 holds.
- the device information management table records device IDs and certificate IDs of the public key certificates that the devices hold.
- the authentication processing unit 103 performs authentication processing with the devices. Also, upon receiving an authentication request from the device management unit 101 along with a public key certificate of a device, the authentication processing unit 103 acquires the CRL recorded in the authentication information storage unit 104, and verifies whether the certificate ID of the public key certificate of the device is recorded in the CRL. The authentication processing unit 103 also verifies the signature of the public key certificate using the public key (omitted from illustration) of the portal server, which is the certificate authority. The authentication processing unit 103 also generates a random number and transmits the random number to the device. The authentication processing unit 103 verifies a signature of the random number received from the device. In a case where any one of the verifications fails, the authentication processing unit 103 determines that the device is an unauthorized device.
- the authentication information storage unit 104 holds a key pair of secret key and public key certificate, and the CRL.
- the secret key, public key certificate, and CRL are embedded in the authentication information storage unit 104 when shipping.
- Fig. 4 is a diagram illustrating an example of the configuration of a public key certificate.
- the public key certificate is configured including version, issuer, start and end of validity period, certificate ID, and signature of the portal server, which is the certificate authority.
- Fig. 5 is a diagram illustrating an example of the configuration of a CRL.
- the CRL is configured including CRL version, issuer, issue date, next issue date, revoked certificate ID, and signature of the portal server, which is the certificate authority.
- the certificate ID is not restricted to being one; multiple certificate IDs may be included.
- the communication unit 105 communicates with the device 200, manufacturer server 300a, and service server 300b.
- the communication unit 105 communicates with the server via SSL (Secure Socket Layer) communication. Certificates necessary for SSL communication are recorded at the communication unit 105.
- SSL Secure Socket Layer
- Fig. 6 is a configuration diagram of the device 200.
- the device 200 includes a device management unit 201, a device history storage unit 202, a device information storage unit 203, an authentication processing unit 204, an authentication information storage unit 205, and a communication unit 206.
- the device management unit 201 transmits a connection request to the controller 100 when starting up.
- the communication unit 206 performs SSL communication with the content server 300c.
- the device management unit 201 transmits an authentication request to the authentication processing unit 204 upon receiving a public key certificate from the controller.
- the device management unit 201 receives the results of authentication from the authentication processing unit 204.
- the device management unit 201 registers the controller ID and certificate ID in a connecting controller management table held at the device information storage unit 203.
- the device management unit 201 also periodically or non-periodically transmits device history recorded at the device history storage unit 202 to the server via the controller. Note that in a case where direct connection has been made to the content server, transmission is made to the server without going through the controller.
- the device history storage unit 202 acquires and records operation history of the device.
- the device information storage unit 203 manages information of the controller 100 connecting to the device.
- Fig. 7 is a diagram illustrating an example of a connecting controller management table which the device information storage unit 203 holds.
- the connecting controller management table records controller IDs and certificate IDs of the public key certificates which the controllers hold.
- the authentication processing unit 204 performs authentication processing with the controller. Also, upon receiving an authentication request from the device management unit 201 along with a public key certificate, the authentication processing unit 204 acquires the CRL recorded in the authentication information storage unit 205, and verifies whether the certificate ID of the public key certificate of the controller is recorded in the CRL. The authentication processing unit 204 also verifies the signature of the public key certificate using the public key (omitted from illustration) of the portal server, which is the certificate authority. The authentication processing unit 204 also generates a random number and transmits the random number to the controller. The authentication processing unit 204 verifies a signature of the random number received from the controller. In a case where any one of the verifications fails, the authentication processing unit 204 determines that the controller is an unauthorized device.
- the authentication information storage unit 205 holds a key pair of secret key and public key certificate, and the CRL.
- the key pair of the secret key and public key certificate, and the CRL are embedded in the authentication information storage unit 205 when shipping the device.
- the public key certificate and CRL are of the same configuration as the public key certificate and CRL of the controller, so description will be omitted here.
- the communication unit 206 communicates with the controller 100 and content server 300c.
- the communication unit 206 communicates with the content server via SSL (Secure Socket Layer) communication. Certificates necessary for SSL communication are recorded at the communication unit 206.
- SSL Secure Socket Layer
- Fig. 8 is a configuration diagram of the manufacturer server 300a.
- the manufacturer server 300a is configured including a device information management unit 301, a device information storage unit 302, a CRL management unit 303, a CRL storage unit 304, and a communication unit 305.
- the service server 300b is configured in the same way.
- the device information management unit 301 controls the device information storage unit 302, and manages association between controllers and devices, IDs of controllers and devices being connected and certificate IDs of public key certificates, and device history. Also, upon having detecting an unauthorized device or controller, the device information management unit 301 notifies the portal server of the certificate ID of the public key certificate of that device or controller, and places a CRL issue request. In a case of having updated the CRL, the device information management unit 301 transmits the CRL to the CRL management unit 303.
- the device information storage unit 302 records the IDs and certificate IDs of the controller and devices, and device history.
- Fig. 9 is a diagram illustrating an example of a device information management table that the device information storage unit 302 holds. This shows that device ID1 through device ID3 are connected to controller ID1 which is the ID of the controller. This also shows that the certificate ID of the controller and the certificate IDs of the devices also are recorded. This shows that the history information of the device ID1 is recorded in the history information 1.
- the CRL management unit 303 controls the CRL storage unit 304, and upon having received a CRL from the device information management unit 301, updates the CRL of the CRL storage unit 304.
- the CRL storage unit 304 records CRLs.
- the communication unit 305 communicates with the controller 100a and the portal server 400. Communication with the controller 100a and portal server 400 is performed via SSL communication. Certificates necessary for SSL communication are recorded in the communication unit 305.
- the configuration of the content server 300c differs from that of the manufacturer server 300a. Connection is made with devices without going through the controller, so SSL authentication is performed between the content server 300c and the devices.
- the device information management table of the device information storage unit 302 is thus a device information management table with no controller information.
- Fig. 10 is a configuration diagram of the portal server 400.
- the portal server 400 includes a CRL management unit 401, a CRL storage unit 402, an encryption processing unit 403, an encryption key storage unit 404, and a communication unit 405.
- the CRL management unit 401 controls the CRL storage unit 402 to manage the CRLs. Upon receiving a CRL issue request from the manufacturer server 300a or service server 300b or the like, the CRL management unit 401 sets data other than signature in the CRL, and requests the encryption processing unit 403 to generate a CRL signature. The CRL management unit 401 receives the CRL with the generated signature from the encryption processing unit 403, and records in the CRL storage unit 402.
- the CRL storage unit 402 records the issued CRL.
- the encryption processing unit 403 Upon receiving a request for signature generation from the CRL management unit 401, the encryption processing unit 403 uses a secret key held at the encryption key storage unit 404 to generate the CRL signature. Once the CRL signature is generated, the encryption processing unit 403 transmits to the CRL management unit 401.
- the encryption key storage unit 404 holds the secret key for issuing a CRL for the portal server 400 which is the certificate authority.
- the communication unit 405 perofrms communication with the servers 300a through c.
- the servers 300a through c perform SSL communication. Certificates necessary for SSL communication are recorded at the communication unit 405.
- Operations of the authentication system 10 include the following.
- Fig. 11 through Fig. 12 illustrate a sequence of processing where the device 200c connects to the controller 100a, and is registered to the manufacturer server 300a. Processing where the device 200a or 200b connect to the controller 100a and are registered to the manufacturer server 300a, and processing where the device 200c connects to the controller 100b and is registered to the service server 300a are the same.
- Fig. 13 illustrates a sequence of updating the CRL of the manufacturer server 300a.
- the manufacturer server 300a updates the CRL before the next issue date.
- Fig. 14 through Fig. 15 illustrate a sequence to update the CRL of the device 200c from the controller 100b.
- the processing for updating the CRL of the device 200c from the controller 100a is the same.
- the device 200c records the received CRL in the authentication information storage unit.
- Fig. 16 illustrates a sequence of the content server 300c updating the CRL of the device 200c.
- a device which connects to one controller could not update the CRL if this controller is an unauthorized controller.
- the device receives CRLs from multiple controllers.
- the CRL can be acquired via multiple networks, and updating can be performed. Enabling updating of the CRL enables connection to unauthorized controllers to be prevented, and safe connection to be realized among authorized controllers and devices.
- an encryption key of communication is shared between the controller and device after authentication, and history information of the device is transmitted to the server by encrypted communication.
- the overall configuration of the authentication system 11 according to the second embodiment is the same as in the first embodiment, and accordingly will be omitted here.
- Components having the same configuration as those in the first embodiment are denoted by the same reference numerals, and description will be omitted.
- Operations of the authentication system 11 include the following.
- Fig. 17 through Fig. 19 illustrate a sequence of processing where the device 200c connects to the controller 100a, and is registered to the manufacturer server. Processing where the device 200a or 200b connect to the controller 100a and are registered to the manufacturer server 300a, and processing where the device 200c connects to the controller 100b, and is registered to the service server, are the same.
- the controller 100a transmits the controller ID and public key certificate to the device 200c.
- the processing in (S217) is the same as the processing in S114 in the first embodiment, so description will be omitted here.
- Fig. 22 illustrates a sequence of transmitting device history information from the device to the manufacturer server 300a. This uploading is performed periodically or non-periodically.
- Key exchange is performed when authenticating the device, and the shared key is used for challenge-response authentication in the first embodiment.
- the shared key can be generated from just the public key corresponding to the secret key, so in a case where the secret key corresponding to the public key of the public key certificate is not held, the shared key cannot be generated, and challenge-response authentication will fail. Accordingly, authentication processing can be reduced as compared to authentication processing where signature generation using the secret key and signature verification using the public key are performed. Encrypted communication of the device history information can be performed by the shared key, so leakage of device history information can be prevented.
- a device when a device uploads operating history information to a server via a controller, the operating history information is uploaded together with added CRL information. On the server side, the controller is judged to be unauthorized or not from the CRL information transmitted from the device.
- FIG. 23 is a diagram illustrating an overall configuration of an authentication system 10 according to the third embodiment.
- the authentication system 10 is made up of a controller 100, a device 200, a server 300, and a portal server 400. Structural elements similar to the first embodiment are denoted with the same signs, and the description thereof will be reduced or omitted.
- the third embodiment differs from the first embodiment in that the manufacturer server 300a is connected to the controller 100a and the controller 100b via a network.
- FIG. 24 is a configuration diagram of a device 200a according to the third embodiment.
- the device 200a includes a device management unit 201, a device history storage unit 202, a device information storage unit 203, an authentication processing unit 204, an authentication information storage unit 205, a communication unit 206, and an authentication information adding unit 500.
- the device management unit 201 Since the device management unit 201, the device history storage unit 202, the device information storage unit 203, the authentication processing unit 204, the authentication information storage unit 205, and the communication unit 206 are similar to those described using FIG. 6 in the first embodiment, the description thereof is omitted herein.
- the authentication information adding unit 500 adds the CRL information stored in the authentication information storage unit 205 to the device history information to generate device history information with added CRL information 700.
- the device history information with added CRL information 700 will be discussed later using FIG. 26 .
- FIG. 25 is a diagram illustrating the device history information 600 stored in the device history storage unit 202 according to the third embodiment.
- the device history information 600 is information that indicates who performed what operations on a device and when, and includes a time of operation 601, operation history details 602, and the user ID 603 of the person who performed the operation.
- FIG. 26 is a diagram illustrating device history information with added CRL information 700 according to the third embodiment.
- a signature 703 which is the private key of a device, is assigned to a device ID 701, device history information 600, and a CRL version 702. Since the signature generation method is similar to the first embodiment, the description thereof is omitted.
- the device history information with added CRL information 700 is uploaded by the communication unit 206 and ultimately to the server via the controller. A sequence of uploading the device history information with added CRL information 700 to the server will be discussed later using FIGS. 29 to 31 .
- FIG. 27 is a configuration diagram of the manufacturer server 300a according to the third embodiment.
- the manufacturer server 300a includes a device information management unit 301, a device information storage unit 302, a CRL management unit 303, a CRL storage unit 304, a communication unit 305, and a CRL determination result storage 800.
- the service server 300b likewise has a similar configuration. Since the device information management unit 301, the device information storage 302, the CRL management unit 303, the CRL storage unit 304, and the communication unit 305 are similar to FIG. 8 of the first embodiment, the description thereof is omitted.
- the CRL determination result storage 800 stores a result of the manufacturer server 300a judging whether or not a controller is correctly distributing the CRL to each device. Details will be described using FIG. 28 .
- FIG. 28 is a diagram illustrating CRL determination result information 801 stored in the CRL determination result storage 800 according to the third embodiment.
- the CRL determination result information 801 includes a controller ID 802 and an unauthorized controller determination result 803.
- the unauthorized controller determination result 803 is the result of the manufacturer server 300a judging whether or not a controller is unauthorized by using the device history information with added CRL information 700.
- An unauthorized controller determination result 803 of "authorized” indicates that the controller is distributing an up-to-date CRL to device.
- an unauthorized controller determination result 803 of "unauthorized” indicates that the controller is not distributing an up-to-date CRL to device.
- FIGS. 29 to 31 illustrates a sequence of updating the CRL when the device 200c connects to the controller 100a and uploads device history information with added CRL information 700 to the manufacturer server 300a.
- the process of the device 200a or the device 200b connecting to the controller 100a and uploading device history information with added CRL information 700 to the manufacturer server 300a is also similar.
- the device history information with added CRL information 700 is uploaded to the manufacturer server 300a in this sequence, the device history information with added CRL information 700 may also be uploaded to the service server 300b. Even in such a case, the sequence is similar to the present sequence.
- the uploading of the device history information with added CRL information 700 may be conducted from the device 200c periodically, or when triggered by the timing of a specific process.
- FIG. 32 is a sequence diagram of processing a request from the controller 100a using an unauthorized controller determination result.
- the manufacturer server 300a references the up-to-date CRL recorded in the manufacturer server 300a, and checks whether or not the controller ID of the connection host is listed in the up-do-date CRL, and is thereby able to judge whether or not the controller is unauthorized. However, in some cases, it takes time to register a newly discovered unauthorized controller in the up-to-date CRL and publish a new CRL. In the present embodiment, the manufacturer server 300a uses the device history information with added CRL information 700 to references the determined unauthorized controller determination result 803, and thus is able to prevent unauthorized control of device via an unauthorized controller, even during the period before the unauthorized controller is registered in the CRL.
- the CRL of the controller is updated at the timing of uploading device history information.
- FIG. 33 is a diagram illustrating device history information with added CRL information 1000 according to the fourth embodiment.
- the device history information with added CRL information 1000 differs from the device history information with added CRL information 700 in that a CRL 1001 is provided instead of the CRL version 702. Since the structure of the CRL 1001 is similar to FIG. 5 , description thereof is omitted.
- FIG. 34 is a diagram illustrating a sequence for the case of updating the CRL of a controller when uploading the device history information with added CRL information 1000.
- FIG. 34 is a diagram illustrating a sequence for the case of updating the CRL of a controller when uploading the device history information with added CRL information 1000.
- the unauthorized controller may be detected by acquiring a CRL via multiple networks.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Description
- The present disclosure relates to an authentication system that enables a device and controller to be safely connected.
- In recent years, home electric appliances and audiovisual devices have come to be connected to networks, and there is anticipation for services using various types of history information collected therefrom to the cloud. In this arrangement, a controller is installed in the home, and transmission of history information from the home electric appliance devices to a manufacturer's server is relayed through the controller. Setting the connection between the controller and the home electrical appliances so as to be safe enables communication within the home to be controlled, and leakage of information over wireless communication and connection to the in-home network by spoofing to be prevented.
- To this end, the Wi-Fi Alliance has conventionally set forth a standard to facilitate connection among devices, called Wi-Fi Protected Setup (NPL 1). However, in Wi-Fi wireless connection, this only guarantees interconnection among devices at an access point of devices and home electric appliances, that is equivalent to a controller, and does not guarantee whether a connecting device is valid or not.
- Usage of the Public Key Infrastructure (PKI) to authenticate the validity of devices has been conventionally known (NPL 2). Authentication based on PKI guarantees the validity of devices by authenticating that an entity (home electric appliance or controller) has a secret key and a public key certificate issued by a certificate authority. Once there is an occurrence of leakage of a secret key or the like regarding a public key certificate, the public key certificate needs to be revoked in order to prevent unauthorized use of the public key certificate. A representative way to revoke a public key certificate is a CRL (Certificate Rvocation List) (NPL 2) which is a list of certificate revocations. A CRL is a list of revoked public key certificates, with IDs and the like of revoked public key certificates affixed with the signature of the certificate authority that has issued the public key certificate, and distributed. The entity such as the home electric appliance or controller verifies whether the public key certificate of another entity to which it is to connect is not listed in the CRL. Accordingly, the newest CRL needs to be used as the CRL.
- Additional prior art is known from
-
EP 2034661 andUS 2009/249062 . -
- NPL 1: Wi-Fi Alliance, "Wi-Fi CERTIFIED Wi-Fi Protected Setup: Easing the User Experience for Home and Small Office Wi-FiR Networks (2010)", [online], December 2010, [Searched June 24, 2014], Internet <URL: http://www.wi-fi.org/ja/file/wi-fi-certified-wi-fi-protected-setup%E2%84%A2-easing-the-user-experience-for-home-and-small-office-wi>
- NPL 2: Compiled by Atsuko Miyaji / Hiroaki Kikuchi, "IT Text Information Security" published by Ohmsha, October 2003
- NPL 3: National Security Agency, "Suite B Implementer's Guide to FIPS 186-3 (ECDSA)", [online], February 3, 2010, [Searched June 24, 2014], Internet <URL: http://www.nsa.gov/ia/_files/ecdsa.pdf>
- NPL 4: Elaine Barker, three others, NIST Special Publication 800-
- NPL 5: D. Forsberg, four others, RFC5191, "Protocol for Carrying Authentication for Network Access (PANA)", [online], May 2008, Internet Engineering Task Force, [Searched June 24, 2014], Internet <URL: http://www.rfc-editor.org/rfc/pdfrfc/rfc5191 .txt.pdf>
- Further improvement has been needed with the above-described conventional authentication system.
- An authentication method according to an aspect of the present disclosure is authentication method in an authentication system including a server, a device, and a first controller that controls the equipment. The authentication method includes:
- the device storing a first certificate revocation list and device history information; the server storing a second certificate revocation list;
- the device transmitting to the first controller device history information with added authentication information including the device history information and first age-identifying information of the first certificate revocation list;
- the first controller transmitting to the server the device history information with added authentication information; and
- the server comparing first age-identifying information included in the first certificate revocation list from the device history information with added authentication information to second age-identifying information included in the second certificate revocation list, and if the first age-identifying information is indicated to be older than the second age-identifying information, judging that the first controller is unauthorized.
- It should be noted that these general or specific embodiments may be implemented as a system, a device, a method, an integrated circuit, a computer program, or a storage medium, or any combination of a system, method, integrated circuit, computer program, and storage medium. The invention is defined in the
independent claims - According to the present disclosure, further improvement can be realized.
-
- [
Fig. 1] Fig. 1 is an overall configuration diagram of an authentication - [
Fig. 2] Fig. 2 is a configuration diagram of a controller according to the first embodiment. - [
Fig. 3] Fig. 3 is a diagram illustrating an example of a connection device management table of the controller according to the first embodiment. - [
Fig. 4] Fig. 4 is a diagram illustrating an example of a public key certificate according to the first embodiment. - [
Fig. 5] Fig. 5 is a diagram illustrating an example of a CRL according to the first embodiment. - [
Fig. 6] Fig. 6 is a configuration diagram of a device according to the first embodiment. - [
Fig. 7] Fig. 7 is a diagram illustrating an example of a connection controller management table of the device according to the first embodiment. - [
Fig. 8] Fig. 8 is a configuration diagram of a manufacturer server according to the first embodiment. - [
Fig. 9] Fig. 9 is a diagram illustrating an example of a device information management table of the manufacturer server according to the first embodiment. - [
Fig. 10] Fig. 10 is a configuration diagram of a portal server according to the first embodiment. - [
Fig. 11] Fig. 11 is a sequence diagram for when registering a device, according to the first embodiment. - [
Fig. 12] Fig. 12 is a sequence diagram for when registering a device, according to the first embodiment. - [
Fig. 13] Fig. 13 is a sequence diagram for when updating a CRL of a manufacturer server, according to the first embodiment. - [
Fig. 14] Fig. 14 is a sequence diagram for when updating a CRL of a device, according to the first embodiment. - [
Fig. 15] Fig. 15 is a sequence diagram for when updating a CRL of the device, according to the first embodiment. - [
Fig. 16] Fig. 16 is a sequence diagram for when updating a CRL of the device, according to the first embodiment. - [
Fig. 17] Fig. 17 is a sequence diagram for when registering a device, according to a second embodiment. - [
Fig. 18] Fig. 18 is a sequence diagram for when registering the device, according to the second embodiment. - [
Fig. 19] Fig. 19 is a sequence diagram for when registering the device, according to the second embodiment. - [
Fig. 20] Fig. 20 is a diagram illustrating an example of a connection controller management table of the device according to the second embodiment. - [
Fig. 21] Fig. 21 is a diagram illustrating an example of a connecting device management table of the controller according to the second embodiment. - [
Fig. 22] Fig. 22 is a sequence diagram for when performing transmission processing of device history information according to the second embodiment. - [
FIG. 23] FIG. 23 is an overall configuration diagram of anauthentication system 10 according to a third embodiment. - [
FIG. 24] FIG. 24 is a configuration diagram of equipment according to the third embodiment. - [
FIG. 25] FIG. 25 is a configuration diagram of equipment history information according to the third embodiment. - [
FIG. 26] FIG. 26 is a configuration diagram of equipment history information with added CRL information according to the third embodiment. - [
FIG. 27] FIG. 27 is a configuration diagram of a manufacturer server according to the third embodiment. - [
FIG. 28] FIG. 28 is a configuration diagram of CRL determination result information according to the third embodiment. - [
FIG. 29] FIG. 29 is a CRL update sequence diagram when uploading equipment history information with added CRL information according to the third embodiment. - [
FIG. 30] FIG. 30 is a CRL update sequence diagram when uploading equipment history information with added CRL information according to the third embodiment. - [
FIG. 31] FIG. 31 is a CRL update sequence diagram when uploading equipment history information with added CRL information according to the third embodiment. - [
FIG. 32] FIG. 32 is a sequence diagram of processing a request from a controller using an unauthorized controller determination result according to the third embodiment. - [
FIG. 33] FIG. 33 is a configuration diagram of equipment history information with added CRL information according to a fourth embodiment. - [
FIG. 34] FIG. 34 is a CRL update sequence diagram when uploading equipment history information with added CRL information according to the fourth embodiment. - In a case where a home electric appliance connects only to one controller, the home electric appliance acquires the CRL via the controller. At this time, if the controller is an unauthorized device, even of the public key certificate is listed in the CRL, the home electric appliance will authenticate the controller as an authorized device unless the controller distributes a CRL, in which the public key certificate of the controller is listed, to the home electric appliance.
- Based on the above observation, the present inventors arrived at the aspects of the present disclosure.
- An authentication method according to an aspect of the present disclosure is an authentication method in an authentication system including a server, a device, and a first controller that controls the device, the authentication method including:
- the device storing a first certificate revocation list and device history information;
- the server storing a second certificate revocation list;
- the device transmitting to the first controller device history information with added authentication information including the device history information and first age-identifying information of the first certificate revocation list;
- the first controller transmitting to the server the device history information with added authentication information; and
- the server comparing first age-identifying information included in the first certificate revocation list from the device history information with added authentication information to second age-identifying information included in the second certificate revocation list, and if the first age-identifying information is indicated to be older than the second age-identifying information, judging that the first controller is unauthorized.
- Consequently, even when the controller does not distribute an up-to-date certificate revocation list to the device, the server references information about the certificate revocation list attached to the equipment history information from the device, and thus is able to judge that the controller is unauthorized.
- In addition, an unauthorized controller not registered in the certificate revocation list may be detected, and unauthorized control of device via the unauthorized controller may be prevented reliably.
- Furthermore, in an authentication method according to an aspect of the present disclosure, when the server judges that the first controller is unauthorized, the server transmits the second certificate revocation list to a second controller connected to the device, the second controller transmits the second certificate revocation list to the device, and the device updates the first certificate revocation list with the second certificate revocation list.
- Consequently, the device is configured to be connected to a first controller and a second controller, so that even if the first controller is unauthorized, the server is able to distribute an up-to-date certificate revocation list to the device via the second controller, and cause the certificate revocation list to be updated.
- Furthermore, in an authentication method according to an aspect of the present disclosure, when the server judges that the first controller is unauthorized, the server records unauthorized determination information indicating that the first controller is unauthorized, and when there is a process request from the first controller, references the unauthorized determination information, and does not perform the process request from the first controller.
- Consequently, unauthorized control of the device via an unauthorized controller may be prevented even during the period before a newly discovered unauthorized controller is registered in the certificate revocation list.
- Furthermore, in an authentication method according to an aspect of the present disclosure, when the server judges that the first controller is unauthorized, the server transmits the second certificate revocation list to the device, and the device updates the first certificate revocation list with the second certificate revocation list.
- Consequently, when the first controller is judged to be unauthorized, an up-to-date certificate revocation list may be distributed from the server to the device without going through the first controller, and the certificate revocation list in the equipment may be updated.
- The authentication system according to embodiments of the present disclosure will be described below with reference to the drawings. Note that the embodiment described below indicate a preferred specific example of the present disclosure. That is to say, values, shapes, materials, components, placement and connection arrangement of components, steps, orders of steps, and so forth in the following embodiments are only exemplary, and are not intended to restrict the present disclosure. The present disclosure is defined based on the scope of the Claims. Accordingly, components in the following embodiments which are not included in an independent Claim of the present disclosure indicating the highest concept are described as being components which are not necessarily indispensable in achieving solving of the problem but make up a more preferable form.
- An
authentication system 10 according to the present disclosure will be described here as an embodiment of the present disclosure, with reference to the drawings. -
Fig. 1 is a diagram illustrating the overall configuration of theauthentication system 10 according to the present disclosure. Theauthentication system 10 is configured includingcontrollers 100,devices 200, servers 300, and aportal server 400. Thecontrollers 100a to b are devices having functions of controlling devices. Thecontrollers 100a to b also have functions of connecting to servers, transmitting information of home electric appliances to the server, receiving control requests from the servers, controlling the home electric appliances, and so forth. Thedevices 200a through c are home electric appliances and housing facility devices that collect device history information, such as televisions, recorders, air conditioners, refrigerators, batteries, and so forth. Theservers 300a through c are a content server that distributes content, a manufacture server of a manufacturer that manufactures home electric appliances, and a service server of a service provider that provides services. As a specific example, history information of a device in the home is transmitted to the controller, and the control transmits history information of the device to the manufacturer server. Also, in a case where the service server is an electric power company, the electric power company connects to the controller via a home smart meter (omitted from illustration). The controller controls devices in the home based on electric power information from the electric power company, and suppresses consumption of electric power within the home. -
Fig. 2 is a configuration diagram of thecontroller 100a. Thecontroller 100a is configured including adevice management unit 101, a deviceinformation storage unit 102, anauthentication processing unit 103, an authenticationinformation storage unit 104, and acommunication unit 105. Thecontroller 100b also is of the same configuration. - The
device management unit 101 manages devices connected to the controller. In a case where there is a connection request from a device, thedevice management unit 101 transmits the public key certificate received from the device to theauthentication processing unit 103, and requests authentication processing. Thedevice management unit 101 receives the authentication results from theauthentication processing unit 103. In a case where authentication has been successful, thedevice management unit 101 registers the device ID and certificate ID in a connecting device management table held at the deviceinformation storage unit 102. - The device
information storage unit 102 manages information of devices connecting to the controller.Fig. 3 is a diagram illustrating an example of a device information management table which the deviceinformation storage unit 102 holds. The device information management table records device IDs and certificate IDs of the public key certificates that the devices hold. - The
authentication processing unit 103 performs authentication processing with the devices. Also, upon receiving an authentication request from thedevice management unit 101 along with a public key certificate of a device, theauthentication processing unit 103 acquires the CRL recorded in the authenticationinformation storage unit 104, and verifies whether the certificate ID of the public key certificate of the device is recorded in the CRL. Theauthentication processing unit 103 also verifies the signature of the public key certificate using the public key (omitted from illustration) of the portal server, which is the certificate authority. Theauthentication processing unit 103 also generates a random number and transmits the random number to the device. Theauthentication processing unit 103 verifies a signature of the random number received from the device. In a case where any one of the verifications fails, theauthentication processing unit 103 determines that the device is an unauthorized device. - The authentication
information storage unit 104 holds a key pair of secret key and public key certificate, and the CRL. The secret key, public key certificate, and CRL are embedded in the authenticationinformation storage unit 104 when shipping.Fig. 4 is a diagram illustrating an example of the configuration of a public key certificate. The public key certificate is configured including version, issuer, start and end of validity period, certificate ID, and signature of the portal server, which is the certificate authority.Fig. 5 is a diagram illustrating an example of the configuration of a CRL. The CRL is configured including CRL version, issuer, issue date, next issue date, revoked certificate ID, and signature of the portal server, which is the certificate authority. The certificate ID is not restricted to being one; multiple certificate IDs may be included. - The
communication unit 105 communicates with thedevice 200,manufacturer server 300a, andservice server 300b. Thecommunication unit 105 communicates with the server via SSL (Secure Socket Layer) communication. Certificates necessary for SSL communication are recorded at thecommunication unit 105. -
Fig. 6 is a configuration diagram of thedevice 200. Thedevice 200 includes adevice management unit 201, a devicehistory storage unit 202, a deviceinformation storage unit 203, anauthentication processing unit 204, an authenticationinformation storage unit 205, and acommunication unit 206. - The
device management unit 201 transmits a connection request to thecontroller 100 when starting up. In a case of connecting to thecontent server 300c instead of connecting to the controller, thecommunication unit 206 performs SSL communication with thecontent server 300c. Thedevice management unit 201 transmits an authentication request to theauthentication processing unit 204 upon receiving a public key certificate from the controller. Thedevice management unit 201 receives the results of authentication from theauthentication processing unit 204. In a case where authentication is successful, thedevice management unit 201 registers the controller ID and certificate ID in a connecting controller management table held at the deviceinformation storage unit 203. Thedevice management unit 201 also periodically or non-periodically transmits device history recorded at the devicehistory storage unit 202 to the server via the controller. Note that in a case where direct connection has been made to the content server, transmission is made to the server without going through the controller. - The device
history storage unit 202 acquires and records operation history of the device. - The device
information storage unit 203 manages information of thecontroller 100 connecting to the device.Fig. 7 is a diagram illustrating an example of a connecting controller management table which the deviceinformation storage unit 203 holds. The connecting controller management table records controller IDs and certificate IDs of the public key certificates which the controllers hold. - The
authentication processing unit 204 performs authentication processing with the controller. Also, upon receiving an authentication request from thedevice management unit 201 along with a public key certificate, theauthentication processing unit 204 acquires the CRL recorded in the authenticationinformation storage unit 205, and verifies whether the certificate ID of the public key certificate of the controller is recorded in the CRL. Theauthentication processing unit 204 also verifies the signature of the public key certificate using the public key (omitted from illustration) of the portal server, which is the certificate authority. Theauthentication processing unit 204 also generates a random number and transmits the random number to the controller. Theauthentication processing unit 204 verifies a signature of the random number received from the controller. In a case where any one of the verifications fails, theauthentication processing unit 204 determines that the controller is an unauthorized device. - The authentication
information storage unit 205 holds a key pair of secret key and public key certificate, and the CRL. The key pair of the secret key and public key certificate, and the CRL are embedded in the authenticationinformation storage unit 205 when shipping the device. The public key certificate and CRL are of the same configuration as the public key certificate and CRL of the controller, so description will be omitted here. - The
communication unit 206 communicates with thecontroller 100 andcontent server 300c. Thecommunication unit 206 communicates with the content server via SSL (Secure Socket Layer) communication. Certificates necessary for SSL communication are recorded at thecommunication unit 206. -
Fig. 8 is a configuration diagram of themanufacturer server 300a. Themanufacturer server 300a is configured including a deviceinformation management unit 301, a deviceinformation storage unit 302, aCRL management unit 303, aCRL storage unit 304, and acommunication unit 305. Theservice server 300b is configured in the same way. - The device
information management unit 301 controls the deviceinformation storage unit 302, and manages association between controllers and devices, IDs of controllers and devices being connected and certificate IDs of public key certificates, and device history. Also, upon having detecting an unauthorized device or controller, the deviceinformation management unit 301 notifies the portal server of the certificate ID of the public key certificate of that device or controller, and places a CRL issue request. In a case of having updated the CRL, the deviceinformation management unit 301 transmits the CRL to theCRL management unit 303. - The device
information storage unit 302 records the IDs and certificate IDs of the controller and devices, and device history.Fig. 9 is a diagram illustrating an example of a device information management table that the deviceinformation storage unit 302 holds. This shows that device ID1 through device ID3 are connected to controller ID1 which is the ID of the controller. This also shows that the certificate ID of the controller and the certificate IDs of the devices also are recorded. This shows that the history information of the device ID1 is recorded in thehistory information 1. - The
CRL management unit 303 controls theCRL storage unit 304, and upon having received a CRL from the deviceinformation management unit 301, updates the CRL of theCRL storage unit 304. - The
CRL storage unit 304 records CRLs. - The
communication unit 305 communicates with thecontroller 100a and theportal server 400. Communication with thecontroller 100a andportal server 400 is performed via SSL communication. Certificates necessary for SSL communication are recorded in thecommunication unit 305. - The configuration of the
content server 300c differs from that of themanufacturer server 300a. Connection is made with devices without going through the controller, so SSL authentication is performed between thecontent server 300c and the devices. The device information management table of the deviceinformation storage unit 302 is thus a device information management table with no controller information. -
Fig. 10 is a configuration diagram of theportal server 400. Theportal server 400 includes aCRL management unit 401, aCRL storage unit 402, anencryption processing unit 403, an encryptionkey storage unit 404, and acommunication unit 405. - The
CRL management unit 401 controls theCRL storage unit 402 to manage the CRLs. Upon receiving a CRL issue request from themanufacturer server 300a orservice server 300b or the like, theCRL management unit 401 sets data other than signature in the CRL, and requests theencryption processing unit 403 to generate a CRL signature. TheCRL management unit 401 receives the CRL with the generated signature from theencryption processing unit 403, and records in theCRL storage unit 402. - The
CRL storage unit 402 records the issued CRL. - Upon receiving a request for signature generation from the
CRL management unit 401, theencryption processing unit 403 uses a secret key held at the encryptionkey storage unit 404 to generate the CRL signature. Once the CRL signature is generated, theencryption processing unit 403 transmits to theCRL management unit 401. - The encryption
key storage unit 404 holds the secret key for issuing a CRL for theportal server 400 which is the certificate authority. - The
communication unit 405 perofrms communication with theservers 300a through c. Theservers 300a through c perform SSL communication. Certificates necessary for SSL communication are recorded at thecommunication unit 405. - Operations of the
authentication system 10 include the following. - (1) Device registration processing where connection is made from device to controller, and registration is made in server
- (2) Processing to update CRL of
manufacturer server 300a - (3) Processing to update CRL of device
- These will each be described below with reference to the drawings.
-
Fig. 11 through Fig. 12 illustrate a sequence of processing where thedevice 200c connects to thecontroller 100a, and is registered to themanufacturer server 300a. Processing where thedevice controller 100a and are registered to themanufacturer server 300a, and processing where thedevice 200c connects to thecontroller 100b and is registered to theservice server 300a are the same. - (S101) A connection request is performed from the
device 200c to thecontroller 100a. The device ID and public key certificate of the device are also transmitted at this time. - (S102) Verification is performed regarding whether or not the certificate ID of the public key certificate of the
device 200c, regarding which thecontroller 100a has received the connection request, is listed in the CRL held in the authentication information storage unit. If listed in the CRL, an error is notified to thedevice 200c and the processing ends. - (S103) The
controller 100a verifies the signature of the public key certificate received from thedevice 200c. In a case where the verification is not successful, thedevice 200c is notified of an error and the processing ends. The signature at this time may be ECDSA (Elliptic Curve Digital Signature Algorithm). ECDSA is described inNPL 3, and accordingly will not be described here. - (S104) The
controller 100a generates a random number, and transmits to thedevice 200c along with the controller ID and public key certificate. - (S105) The
device 200c verifies whether the certificate ID of the public key certificate of thecontroller 100a which has transmitted the connection request is listed in the CRL that it holds. If listed in the CRL, an error is notified to thecontroller 100a and the processing ends. - (S106) The
device 200c verifies the signature of the public key certificate received from thecontroller 100a. In a case where verification fails, an error is notified to thecontroller 100a and the processing ends. - (S107) The
device 200c generates a signature from the random number received from thecontroller 100a and the secret key of thedevice 200c. - (S108) The
device 200c generates a random number, and transmits to thecontroller 100a along with the signature generated in S107. - (S109) The
controller 100a receives the signature and random number, and verifies the signature using the public key certificate received in S101. In a case where verification of the signature fails, an error is notified to thedevice 200c and the processing ends. - (S110) The
controller 100a generates a signature from the random number received in S109 and the secret key of thecontroller 100a, and transmits the signature to thedevice 200a. - (S111) The
device 200c receives the signature, and verifies the signature using the public key certificate received in S104. In a case where verification of the signature fails, an error is notified to thecontroller 100a and the processing ends. - (S112) In a case where verification in S111 is successful, the
device 200c registers the controller in the connecting controller management table. - (S113) The
controller 100a transmits the controller ID and certificate ID of the public key certificate, and the device ID of the device regarding which verification was successful in S109 and the certificate ID of the public key certificate, to the manufacturer server, and registers the device ID of the device and the certificate ID of the public key certificate in the connecting device management table. - (S114) Upon receiving, from the
controller 100a, the controller ID and certificate ID of the public key certificate of thecontroller 100a and the device ID and certificate ID of the public key certificate of thedevice 200c, themanufacturer server 300a registers in the device information management table. -
Fig. 13 illustrates a sequence of updating the CRL of themanufacturer server 300a. - (S121) The
manufacturer server 300a detects an unauthorized device. Specific examples are a case of detecting multiple controllers connecting to themanufacturer server 300a with the same certificate ID, a case of detecting multiple devices of the same certificate ID registered to themanufacturer server 300a, and so forth. Also, in a case where leakage of a secret key has been detected, a device or controller having a public key certificate corresponding thereto is also determined to be an unauthorized device. - (S122) The
manufacturer server 300a adds the certificate ID of the unauthorized device or the unauthorized controller detected in S121, to the certificate IDs listed in the CRL. - (S123) The
manufacturer server 300a transmits a CRL issue request along with the certificate IDs of the public key certificates of all unauthorized devices and unauthorized controllers, to theportal server 400 which is the certificate authority. - (S124) The
portal server 400 issues a CRL from the received certificate IDs. - (S125) The
portal server 400 transmits the CRL to themanufacturer server 300a. - (S126) The
manufacturer server 300a records the received CRL in the CRL storage unit, thereby updating to the newest CRL. - The above is an example of processing of updating the CRL of the
manufacturer server 300a, but processing for updating CRLs held by theservice server 300b andcontent server 300c is the same processing. - Also, even if detecting no unauthorized devices in S121, the
manufacturer server 300a updates the CRL before the next issue date. -
Fig. 14 through Fig. 15 illustrate a sequence to update the CRL of thedevice 200c from thecontroller 100b. Although an example of processing where thecontroller 100b updates the CRL of thedevice 200c will be described, the processing for updating the CRL of thedevice 200c from thecontroller 100a is the same. - (S131) After updating the CRL, the
service server 300b requests thecontroller 100b for CRL updating processing along with the CRL. - (S132) The
controller 100b updates to the CRL received from theservice server 300b. - (S133) The
controller 100b verifies whether a connecting device is listed in the CRL. If listed, this is notified to theservice server 300b, and the registration of the listed device is deleted. - (S134) The
controller 100b requests all connectingdevices 200 for CRL updating processing along with the CRL. Description will be made here based on an example of requesting thedevice 200c to perform updating processing. - (S135) The
device 200c verifies the signature of the received CRL. In a case where verification is not successful, the CRL updating processing ends. - (S136) The
device 200c verifies whether or not all connecting controllers are listed in the CRL. If even one connecting controller is listed, the other devices and controllers are notified of detection of an unauthorized controller. Registration of this unauthorized controller is deleted from the connecting controller management table as well. - (S137) The
device 200c compares the CRL received from thecontroller 100b and the CRL in the authentication information storage unit, and verifies whether or not there is inconsistency. Specifically, in a case where a CRL received from thecontroller 100a has been recorded, comparison is made between the issue date of the CRL received from thecontroller 100b and the next issue date of the CRL received from thecontroller 100a. In a case where the next issue date of the CRL received from thecontroller 100a is before the issue date of the CRL received from thecontroller 100b, determination is made that the next issue date of the CRL received from thecontroller 100a has passed, so thecontroller 100a is detected as an unauthorized controller since it did not update the CRL. Also, the versions of the CRLs received from thecontroller 100a and thecontroller 100b are compared, and if the CRL version does not match, the controller which transmitted the older version CRL is detected as an unauthorized controller since it did not update the CRL. At this time, thedevice 200c notifies the other devices and controllers of detection of an unauthorized controller. Registration of this unauthorized controller is deleted from the connecting controller management table as well. Connection with thecontroller 100a is also cut off. - Note that although the above describes using the issue date and the version of CRLs to determine CRL contradictions, the configuration is not limited thereto, and any information enabling the relative age of a CRL to be identified may be used.
- (S138) The
device 200c records the received CRL in the authentication information storage unit. -
Fig. 16 illustrates a sequence of thecontent server 300c updating the CRL of thedevice 200c. - (S141) After updating the CRL, the
content server 300c requests thedevice 200a for CRL updating processing along with the CRL. - (S142) The
device 200c verifies whether or not all connecting controllers are listed in the CRL. If even one connecting controller is listed, the other devices, controllers, andcontent server 300c are notified of detection of an unauthorized controller. Registration of this unauthorized controller is deleted from the connecting controller management table as well. - (S143) is the same as the processing S137 and thus will be omitted.
- (S144) is the same as the processing S138 and thus will be omitted.
- A device which connects to one controller could not update the CRL if this controller is an unauthorized controller. In the first embodiment, the device receives CRLs from multiple controllers. Thus, the CRL can be acquired via multiple networks, and updating can be performed. Enabling updating of the CRL enables connection to unauthorized controllers to be prevented, and safe connection to be realized among authorized controllers and devices.
- An
authentication system 11 according to the present disclosure will be described here as an embodiment of the present disclosure, with reference to the drawings. - In the
authentication system 11 according to a second embodiment, an encryption key of communication is shared between the controller and device after authentication, and history information of the device is transmitted to the server by encrypted communication. - The overall configuration of the
authentication system 11 according to the second embodiment is the same as in the first embodiment, and accordingly will be omitted here. Components having the same configuration as those in the first embodiment are denoted by the same reference numerals, and description will be omitted. - Operations of the
authentication system 11 include the following. - (1) Device registration processing where connection is made from device to controller, and registration is made in server
- (2) Processing to update CRL of
manufacturer server 300a - (3) Processing to update CRL of device
- (4) Processing to transmit device history information from device to server
- The processing of (2) and (3) is the same as in the first embodiment, so description will be omitted here.
- Each will be described below with reference to the drawings.
-
Fig. 17 through Fig. 19 illustrate a sequence of processing where thedevice 200c connects to thecontroller 100a, and is registered to the manufacturer server. Processing where thedevice controller 100a and are registered to themanufacturer server 300a, and processing where thedevice 200c connects to thecontroller 100b, and is registered to the service server, are the same. - The processing in (S201) through (S203) is the same as the processing in S101 through S103 in the first embodiment, so description will be omitted here.
- (S204) The
controller 100a transmits the controller ID and public key certificate to thedevice 200c. - The processing in (S205) through (S206) is the same as the processing in S105 through S106 in the first embodiment, so description will be omitted here.
- (S207) The
device 200c andcontroller 100a exchange keys. ECDH (Elliptic Curve Diffie-Hellman), which is an elliptic curve cryptography key exchange method is used here. ECDH is described inNPL 4, and accordingly will not be described here. - (S208) The
device 200c andcontroller 100a set the key shared in the key exchange as a shared key. - (S209) The
controller 100a generates a random number, and transmits to thedevice 200c. - (S210) The
device 200c receives the random number from thecontroller 100a, and encrypts using the shared key. - (S211) The
device 200c generates a random number, and transmits to thecontroller 100a along with the encrypted random number generated in S210. - (S212) The
controller 100a receives the encrypted random number and the random number, decrypts the encrypted random number using the shared key, and verifies whether it matches the random number generated in S209. In a case where verification fails, an error is notified to thedevice 200c and the processing ends. - (S213) In a case where verification is successful in S212, the
controller 100a uses the shared key to encrypt the random number received in S212, and transmits the encrypted random number to thedevice 200c. - (S214) The
device 200c receives the encrypted random number, decrypts the encrypted random number using the shared key, and verifies whether it matches the random number generated in S211. In a case where verification fails, an error is notified to thecontroller 100a and the processing ends. - (S215) In a case where verification is successful in S214, the
device 200c registers thecontroller 100a in the connecting controller management table.Fig. 20 is a connecting controller management table according to the second embodiment, configured including the shared key shared with the controller, in addition to the connecting controller management table according to the first embodiment. - (S216) The
controller 100a transmits the controller ID and certificate ID of the public key certificate, and the device ID of the device regarding which verification was successful in S212 and the certificate ID of the public key certificate, to themanufacturer server 300a, and registers the device ID of the device and the certificate ID of the public key certificate in the connecting device management table.Fig. 21 is a connecting device management table according to the second embodiment, configured including the shared key shared with the device, in addition to the connecting device management table according to the first embodiment. - The processing in (S217) is the same as the processing in S114 in the first embodiment, so description will be omitted here.
-
Fig. 22 illustrates a sequence of transmitting device history information from the device to themanufacturer server 300a. This uploading is performed periodically or non-periodically. - (S221) The device encrypts accumulated device history information using the shared key, and transmits to the controller along with the device ID.
- (S222) The controller receives the device ID and encrypted device history information, searches for the shared key based on the device ID, and decrypts the device history information using the shared key.
- (S223) The controller and
manufacturer server 300a perform SSL authentication, and establish an encrypted communication path. - (S224) The controller transmits the controller ID and device ID received from the device and the device history information to the
manufacturer server 300a. - (S225) The
manufacturer server 300a registers the received controller ID, device ID, and device history information. - Key exchange is performed when authenticating the device, and the shared key is used for challenge-response authentication in the first embodiment. The shared key can be generated from just the public key corresponding to the secret key, so in a case where the secret key corresponding to the public key of the public key certificate is not held, the shared key cannot be generated, and challenge-response authentication will fail. Accordingly, authentication processing can be reduced as compared to authentication processing where signature generation using the secret key and signature verification using the public key are performed. Encrypted communication of the device history information can be performed by the shared key, so leakage of device history information can be prevented.
- In a third embodiment, when a device uploads operating history information to a server via a controller, the operating history information is uploaded together with added CRL information. On the server side, the controller is judged to be unauthorized or not from the CRL information transmitted from the device. Hereinafter, a detailed description will be given using the drawings.
-
FIG. 23 is a diagram illustrating an overall configuration of anauthentication system 10 according to the third embodiment. Theauthentication system 10 is made up of acontroller 100, adevice 200, a server 300, and aportal server 400. Structural elements similar to the first embodiment are denoted with the same signs, and the description thereof will be reduced or omitted. The third embodiment differs from the first embodiment in that themanufacturer server 300a is connected to thecontroller 100a and thecontroller 100b via a network. -
FIG. 24 is a configuration diagram of adevice 200a according to the third embodiment. Thedevice 200a includes adevice management unit 201, a devicehistory storage unit 202, a deviceinformation storage unit 203, anauthentication processing unit 204, an authenticationinformation storage unit 205, acommunication unit 206, and an authenticationinformation adding unit 500. - Since the
device management unit 201, the devicehistory storage unit 202, the deviceinformation storage unit 203, theauthentication processing unit 204, the authenticationinformation storage unit 205, and thecommunication unit 206 are similar to those described usingFIG. 6 in the first embodiment, the description thereof is omitted herein. - When
device history information 600 stored in the devicehistory storage unit 202 is uploaded to themanufacturer server 300a, the authenticationinformation adding unit 500 adds the CRL information stored in the authenticationinformation storage unit 205 to the device history information to generate device history information with addedCRL information 700. The device history information with addedCRL information 700 will be discussed later usingFIG. 26 . -
FIG. 25 is a diagram illustrating thedevice history information 600 stored in the devicehistory storage unit 202 according to the third embodiment. - The
device history information 600 is information that indicates who performed what operations on a device and when, and includes a time ofoperation 601, operation history details 602, and theuser ID 603 of the person who performed the operation. -
FIG. 26 is a diagram illustrating device history information with addedCRL information 700 according to the third embodiment. - In the device history information with added
CRL information 700, asignature 703, which is the private key of a device, is assigned to adevice ID 701,device history information 600, and aCRL version 702. Since the signature generation method is similar to the first embodiment, the description thereof is omitted. The device history information with addedCRL information 700 is uploaded by thecommunication unit 206 and ultimately to the server via the controller. A sequence of uploading the device history information with addedCRL information 700 to the server will be discussed later usingFIGS. 29 to 31 . -
FIG. 27 is a configuration diagram of themanufacturer server 300a according to the third embodiment. Themanufacturer server 300a includes a deviceinformation management unit 301, a deviceinformation storage unit 302, aCRL management unit 303, aCRL storage unit 304, acommunication unit 305, and a CRLdetermination result storage 800. Theservice server 300b likewise has a similar configuration. Since the deviceinformation management unit 301, thedevice information storage 302, theCRL management unit 303, theCRL storage unit 304, and thecommunication unit 305 are similar toFIG. 8 of the first embodiment, the description thereof is omitted. - The CRL
determination result storage 800 stores a result of themanufacturer server 300a judging whether or not a controller is correctly distributing the CRL to each device. Details will be described usingFIG. 28 . -
FIG. 28 is a diagram illustrating CRL determination resultinformation 801 stored in the CRLdetermination result storage 800 according to the third embodiment. - The CRL determination result
information 801 includes acontroller ID 802 and an unauthorizedcontroller determination result 803. - The unauthorized
controller determination result 803 is the result of themanufacturer server 300a judging whether or not a controller is unauthorized by using the device history information with addedCRL information 700. - An unauthorized controller determination result 803 of "authorized" indicates that the controller is distributing an up-to-date CRL to device. On the other hand, an unauthorized controller determination result 803 of "unauthorized" indicates that the controller is not distributing an up-to-date CRL to device.
-
FIGS. 29 to 31 illustrates a sequence of updating the CRL when thedevice 200c connects to thecontroller 100a and uploads device history information with addedCRL information 700 to themanufacturer server 300a. The process of thedevice 200a or thedevice 200b connecting to thecontroller 100a and uploading device history information with addedCRL information 700 to themanufacturer server 300a is also similar. Also, although the device history information with addedCRL information 700 is uploaded to themanufacturer server 300a in this sequence, the device history information with addedCRL information 700 may also be uploaded to theservice server 300b. Even in such a case, the sequence is similar to the present sequence. Also, the uploading of the device history information with addedCRL information 700 may be conducted from thedevice 200c periodically, or when triggered by the timing of a specific process. - (S301) The authentication
information adding unit 500 of thedevice 200c consolidates its own device ID,device history information 600, and CRL version information read out from the CRL stored in the authenticationinformation storage unit 205, and applies a signature using the private key of thedevice 200c to generate the device history information with addedCRL information 700. For the signature algorithm, a public-key cryptography algorithm such as an elliptic curve cryptosystem (ECC) may be used. Public-key cryptography other than ECC may also be used. - (S302) The
device 200c encrypts the device history information with addedCRL information 700 with the shared key shared with thecontroller 100a. - (S303) The
device 200c sends the encrypted device history information with addedCRL information 700 to thecontroller 100a. - (S304) The
controller 100a decrypts the encrypted device history information with addedCRL information 700 received from thedevice 200c. - (S305) The
controller 100a conducts SSL authentication with themanufacturer server 300a, and shares a session key. - (S306) The
controller 100a transmits the controller ID and the device history information with addedCRL information 700 to themanufacturer server 300a. - (S307) The
manufacturer server 300a verifies thesignature 703 of the device history information with addedCRL information 700 received from thecontroller 100a. If the verification result is judged to be a verification error, the process ends. Otherwise, if verification is judged to be successful, the process proceeds to S308. - (S308) The
manufacturer server 300a compares theCRL version 702 in the received device history information with addedCRL information 700 to the CRL version listed in the CRL stored in theCRL storage unit 304 of themanufacturer server 300a, and checks whether or not the version of the received CRL is up-to-date. If the check result indicates that the version of the received CRL is up-to-date, this means that thecontroller 100a is distributing an up-to-date CRL to thedevice 200c, and thus the unauthorized controller determination result corresponding to thecontroller 100a is taken to be "authorized", the device history information is stored in the server, and the process ends. Otherwise, if the version of the received CRL is not up-to-date, there is a possibility that thecontroller 100a is not distributing an up-to-date CRL to thedevice 200c, and thus the unauthorized controller determination result corresponding to thecontroller 100a is recorded as "unauthorized", and the process proceeds to S309. - (S309) In order to issue a CRL update request to the
device 200c, themanufacturer server 300a conducts SSL authentication and connects to thecontroller 100b other than thecontroller 100a to which thedevice 200c is connected. - (S310) The
manufacturer server 300a transmits the device ID of thedevice 200c and the up-to-date CRL to thecontroller 100b. - (S311) The
controller 100b transmits the controller ID and the CRL received from S310 to thedevice 200c. - (S312) The process is similar to the process of S135, and thus description thereof is omitted.
- (S313) The process is similar to the process of S136, and thus description thereof is omitted.
- (S314) The process is similar to the process of S137, and thus description thereof is omitted.
- (S315) The process is similar to the process of S138, and thus description thereof is omitted.
-
FIG. 32 is a sequence diagram of processing a request from thecontroller 100a using an unauthorized controller determination result. - (S401) The
controller 100a sends the controller ID and a process request to themanufacturer server 300a. The process request herein refers to a control command for controlling thedevice 200c or the like, for example. - (S402) The
manufacturer server 300a references the unauthorized controller determination result 803 corresponding to thecontroller 100a, and references whether or not thecontroller 100a is judged to be "unauthorized". If the reference result indicates that thecontroller 100a is determined to be "unauthorized", the request from thecontroller 100a is not processed, and an error report is sent to thecontroller 100a. - (S403) If the result of referencing the unauthorized
controller determination result 803 indicates that thecontroller 100a is determined to be "authorized", themanufacturer server 300a executes the process requested from thecontroller 100a, and returns the process result. - In the previous embodiments, the
manufacturer server 300a references the up-to-date CRL recorded in themanufacturer server 300a, and checks whether or not the controller ID of the connection host is listed in the up-do-date CRL, and is thereby able to judge whether or not the controller is unauthorized. However, in some cases, it takes time to register a newly discovered unauthorized controller in the up-to-date CRL and publish a new CRL. In the present embodiment, themanufacturer server 300a uses the device history information with addedCRL information 700 to references the determined unauthorizedcontroller determination result 803, and thus is able to prevent unauthorized control of device via an unauthorized controller, even during the period before the unauthorized controller is registered in the CRL. - In a fourth embodiment, the CRL of the controller is updated at the timing of uploading device history information.
-
FIG. 33 is a diagram illustrating device history information with addedCRL information 1000 according to the fourth embodiment. - The device history information with added
CRL information 1000 differs from the device history information with addedCRL information 700 in that aCRL 1001 is provided instead of theCRL version 702. Since the structure of theCRL 1001 is similar toFIG. 5 , description thereof is omitted. -
FIG. 34 is a diagram illustrating a sequence for the case of updating the CRL of a controller when uploading the device history information with addedCRL information 1000. Hereinafter, only the parts different from the third embodiment will be described. - (S401) The process is similar to the process of S301, and thus description thereof is omitted.
- (S402) The process is similar to the process of S302, and thus description thereof is omitted.
- (S403) The process is similar to the process of S303, and thus description thereof is omitted.
- (S404) The process is similar to the process of S304, and thus description thereof is omitted.
- (S405) The
controller 100a verifies theCRL 1001 in the device history information with addedCRL information 1000 received from thedevice 200c. If verification fails, the process is ended. If verification is successful, the process proceeds to S406. - (S406) The
controller 100a compares theCRL 1001 received from thedevice 200c to the CRL in the authenticationinformation storage unit 102, and verifies whether or not a contradiction exists. Since the method of determining a contradiction is similar to S137, description thereof is omitted. If updating the CRL recorded in thecontroller 100a is not necessary, the device history information with addedCRL information 1000 is sent to themanufacturer server 300a. - (S407) If the result of S406 indicates that the CRL received from the
device 200c is more up-to-date, the CRL recorded in thecontroller 100a is updated with theCRL 1001. - In so doing, it becomes possible to update the CRL recorded in the controller at the timing of uploading device history information to the manufacturer server via the controller.
- Although the present disclosure has been described based on the above embodiments, it is needless to say that the present disclosure is not restricted to the above embodiment. The following arrangements are also included in the present disclosure.
- (1) In the above embodiments, the controller may acquire a CRL from the server during the device registration processing. Acquisition may be periodically performed outside of device registration processing. Acquisition may also be performed before the server next issue date of the CRL.
- (2) While the device communicates with the server via the controller to acquire a CRL in the above embodiments, this is not restrictive. The CRL may be acquired by an operating terminal connected to the server. Communication between the operating terminal and the device may be NFC (Near field communication) communication or Bluetooth (a registered trademark) communication.
- (3) Although other devices and controllers are notified when a device determines a controller to be unauthorized in the above embodiments, in a case where the devices or controllers that receive the notification have display functions, a display screen to the effect that an unauthorized controller has been detected may be output. Also, in a case where there is no display screen, an error code may be displayed or a lamp made to blink. Alternatively, the content of the control command may simply be ignore and not executed.
Accordingly, the user having the unauthorized controller can confirm the display, and can replace the unauthorized controller. - (4) While challenge-response authentication using a shared key is performed in the above second embodiment, this is not restrictive, and EAP-PSK may further be performed using the authentication method described in RFC5191.
- (5) The key for encrypted communication may be exchanged at the time of device registration processing in the above first embodiment. DH (Diffie-Hellman) or ECDH may be used as the key exchange method.
- (6) In the above embodiments, the controller may display the power consumption of the devices to which connection is to be made, the amount of electric power charged in a battery, and the amount of power generated by a solar generator,
- (7) The controller in the above embodiments may be a power distribution board installed in a home.
- (8) Communication between the controller and device in the above embodiments may be Wi-Fi, Specified Low Power Wireless, Power Line Communication, or Bluetooth (a registered trademark).
- (9) Although the function of the server as a certificate authority issuing CRLs and the function as a service server providing control commands are concurrently undertaken, this is not restrictive, and may be divided into separate servers.
- (10) While CRLS are issued in the above embodiments including all certificate IDs of public key certificates of unauthorized controllers, this is not restrictive, and an arrangement may be made where CRLs are issued regarding just devices connecting to the server issuing the control command. Further, CRLs may be issued for each device type or each year of manufacture.
- (11) In the foregoing embodiments, at the stage when an unauthorized controller is detected, the update of the CRL in device is conducted via another controller which is connected to the device and which is not determined to be unauthorized, but the configuration is not limited thereto. A direct CRL may also be distributed from the
manufacturer server 300a directly to device, without going through a controller. - (12) In the foregoing embodiments, the CRL information of the
device 200c is added to the device history information, but the CRL information may also be added to information other than the device history information that is transmitted from thedevice 200c to themanufacturer server 300a. - (13) In the foregoing embodiments, after a controller is detected on the basis of the device history information with added CRL information from the device, the
manufacturer server 300a does not process requests from an unauthorized controller, but the configuration is not limited thereto. A CRL-issuing server may also be notified of the identification information of the unauthorized controller, so that the unauthorized controller is newly registered in the CRL. - (14) The above devices specifically are computer systems configured including a microprocessor, ROM, RAM, a hard disk unit, a display unit, a keyboard, a mouse, or the like. A computer program is recorded in the RAM or hard disk unit. The devices realize their functions by the microprocessor operating according to the computer program. The computer program here is configured by combining multiple command codes indicating instructions to the computer, to realize predetermined functions.
- (15) Part or all of the components configuring the above devise may be configured as a single system LSI (Large Scale Integration). A system LSI is a super-multi-functional LSI manufactured integrating multiple components on a single chip, and specifically is a computer system configured including a microprocessor, ROM, RAM, and so forth. A computer program is recorded in the RAM. The system LSI realizes its functions by the microprocessor operating according to the computer program.
The parts of the components making up the above devices may be individually formed into one chip, or part or all may be included in one chip.
While description has been made regarding a system LSI, there are different names such as IC, LSI, super LSI, and ultra LSI, depending on the degree of integration. The circuit integration technique is not restricted to LSIs, and dedicated circuits or general-purpose processors may be used to realize the same. A FPGA (Field Programmable Gate Array) which can be programmed after manufacturing the LSI, or a reconfigurable processor where circuit cell connections and settings within the LSI can be reconfigured, may be used.
Further, in the event of the advent of an integrated circuit technology which would replace LSIs by advance of semiconductor technology or a separate technology derived therefrom, such a technology may be used for integration of the functional blocks, as a matter of course. Application of biotechnology is a possibility. - (16) Part or all of the components of which the above-described devices may be configured as an IC card detachably mountable to each device or a module. The IC card or standalone module is a computer system configured including a microprocessor, ROM, RAM, and so forth. The IC card or module may include the above-described super-multifunctional LSI. The IC card or module achieves its functions by the microprocessor operating according to the computer program. The IC card or module may be tamper-resistant.
- (17) The present disclosure may be the above-described methods, or may be a computer program which realizes these methods by a computer, or may be digital signals made up of the computer program.
The present disclosure may be the computer program or the digital signals recorded in a computer-readable recording medium, such as for example, a flexible disk, a hard disk, a CD-ROM, MO, DVD, DVD-ROM, DVD-RAM, BD (Bluray (a registered trademark) Disc), semiconductor memory, or the like. The present disclosure may also be the digital signals recorded in these recording mediums.
The present disclosure may be an arrangement where the computer program or the digital signals are transmitted over an electric communication line, wireless or cable communication line, a network of which the Internet is representative, data broadcasting, or the like.
The present disclosure may be a computer system having a microprocessor and memory, where the memory records the computer program, and the microprocessor operates according to the computer program.
The present disclosure may also be carried out by another independent computer system, by the program or digital signals being recorded in the recording medium and being transported, or by the program or digital signals being transferred over the network or the like. - (18) The above-described embodiment and the above-described modifications may be combined.
- According to the present disclosure, in a system in which a device and a controller connect, even if the device connects to an unauthorized controller, the unauthorized controller may be detected by acquiring a CRL via multiple networks.
-
- 10, 11
- authentication system
- 100a, 100b
- controller
- 101
- device management unit
- 102
- device information storage unit
- 103
- authentication processing unit
- 104
- authentication information storage unit
- 105
- communication unit
- 200a, 200b, 200c
- device
- 201
- device management unit
- 202
- device history storage
- 203
- device information storage unit
- 204
- authentication processing unit
- 205
- authentication information storage unit
- 206
- communication unit
- 300a
- manufacturer server
- 300b
- service server
- 300c
- content server
- 301
- device information management unit
- 302
- device information storage unit
- 303
- CRL management unit
- 304
- CRL storage unit
- 305
- communication unit
- 400
- portal server
- 401
- CRL management unit
- 402
- CRL storage unit
- 403
- encryption processing unit
- 404
- cryptographic key storage unit
- 500
- authentication information adding unit
- 600
- device history information
- 601
- time of operation
- 602
- operation history details
- 603
- user ID
- 700, 1000
- device history information with added CRL information
- 701
- device ID
- 702
- CRL version
- 703
- signature
- 800
- CRL determination result storage
- 801
- CRL determination result information
- 802
- controller ID
- 803
- unauthorized controller determination result
- 1001
- CRL
Claims (3)
- An authentication method in an authentication system including a server, a device, a first controller that controls the device and a second controller, the authentication method comprising:the device (200c) storing (S301) a first certificate revocation list including a first age-identifying information and device history information (600);the server (300a) storing a second certificate revocation list, including a second age-identifying information;the device (200c) transmitting (S303) to the first controller (100a) device history information (600) with added authentication information and first age-identifying information of the first certificate revocation list (700);the first controller (100a) transmitting (S306) to the server (300a) the device history information (600) with added authentication information and the first age-identifying information of the first certificate revocation list; andthe server (300a) comparing (S308) first age-identifying information to second age-identifying information, and if the first age-identifying information is indicated to be older than the second age-identifying information, judging, by the server, that the first controller (100a) is unauthorizedand wherein when the server (300a) judges that the first controller (100a) is unauthorized,the server (300a) transmits (S310) the second certificate revocation list to the second controller (100b) connected to the device (200c),the second controller (100b) transmits (S311) the second certificate revocation list to the device (200c), andthe device (200c) updates the first certificate revocation list with the second certificate revocation list.
- The authentication method according to claim 1, wherein
when the server (300a) judges that the first controller (100a) is unauthorized,
the server (300a) records unauthorized determination information indicating that the first controller (100a) is unauthorized,
when there is a process request from the first controller (100a), references the unauthorized determination information, and
does not perform the process request from the first controller (100a). - An authentication system comprising:a server (300a);a device (200c);a first controller (100a) that controls the device and a second controller, whereinthe device (200c) stores a first certificate revocation list including a first age-identifying information and device history information (600);the server (300a) stores a second certificate revocation list, including a second age-identifying information,the device (200c) transmits (S303) to the first controller (100a) device history information (600) with added authentication information and first age-identifying information of the first certificate revocation list (700),the first controller (100a) transmits (S306) to the server (300a) the device history information (600) with added authentication information and the first age-identifying information of the first certificate revocation list, andthe server (300a) compares (S308) first age-identifying information to second age-identifying information, and if the first age-identifying information is indicated to be older than the second age-identifying information,the server judges that the first controller (100a) is unauthorized and wherein when the server (300a) judges that the first controller (100a) is unauthorized,the server (300a) transmits (S310) the second certificate revocation list to the second controller (100b) connected to the device (200c),the second controller (100b) transmits (S311) the second certificate revocation list to the device (200c), andthe device (200c) updates the first certificate revocation list with the second certificate revocation list.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361916521P | 2013-12-16 | 2013-12-16 | |
PCT/JP2014/004747 WO2015092951A1 (en) | 2013-12-16 | 2014-09-16 | Authentication system and authentication method |
Publications (3)
Publication Number | Publication Date |
---|---|
EP3086252A1 EP3086252A1 (en) | 2016-10-26 |
EP3086252A4 EP3086252A4 (en) | 2016-11-23 |
EP3086252B1 true EP3086252B1 (en) | 2020-03-04 |
Family
ID=53402341
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP14871128.6A Active EP3086252B1 (en) | 2013-12-16 | 2014-09-16 | Authentication system and authentication method |
Country Status (4)
Country | Link |
---|---|
US (1) | US10116454B2 (en) |
EP (1) | EP3086252B1 (en) |
JP (1) | JP6464511B2 (en) |
WO (1) | WO2015092951A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3082057B1 (en) * | 2013-12-09 | 2020-11-18 | Panasonic Intellectual Property Corporation of America | Authentication method and authentication system |
EP3086505B1 (en) * | 2013-12-16 | 2020-12-30 | Panasonic Intellectual Property Corporation of America | Authentication system, authentication method and authentication device |
DE102014201234A1 (en) * | 2014-01-23 | 2015-07-23 | Siemens Aktiengesellschaft | Method, management device and device for certificate-based authentication of communication partners in a device |
US11429753B2 (en) * | 2018-09-27 | 2022-08-30 | Citrix Systems, Inc. | Encryption of keyboard data to avoid being read by endpoint-hosted keylogger applications |
US11394544B2 (en) * | 2019-01-07 | 2022-07-19 | Aitivity Inc. | Validation of blockchain activities based on proof of hardware |
US20220353093A1 (en) * | 2021-04-30 | 2022-11-03 | Hewlett Packard Enterprise Development Lp | Systems and methods for assigning a cryptographic identity to node-based systems |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3569123B2 (en) * | 1998-02-13 | 2004-09-22 | 松下電器産業株式会社 | Management standard creation method and recording medium |
JP2003115840A (en) * | 2001-10-02 | 2003-04-18 | Matsushita Electric Ind Co Ltd | Method and system for exchanging certiftcate invalidity list, and server device |
US7590840B2 (en) * | 2003-09-26 | 2009-09-15 | Randy Langer | Method and system for authorizing client devices to receive secured data streams |
WO2005093992A1 (en) * | 2004-03-29 | 2005-10-06 | Matsushita Electric Industrial Co., Ltd. | Information distribution system |
US9054879B2 (en) * | 2005-10-04 | 2015-06-09 | Google Technology Holdings LLC | Method and apparatus for delivering certificate revocation lists |
KR100703811B1 (en) * | 2006-02-28 | 2007-04-09 | 삼성전자주식회사 | Portable Storage Devices and Data Management Methods |
JP4501885B2 (en) * | 2006-03-30 | 2010-07-14 | 村田機械株式会社 | Server device with revocation list acquisition function. |
KR101346734B1 (en) * | 2006-05-12 | 2014-01-03 | 삼성전자주식회사 | Multi certificate revocation list support method and apparatus for digital rights management |
US8245031B2 (en) * | 2006-07-07 | 2012-08-14 | Sandisk Technologies Inc. | Content control method using certificate revocation lists |
US8307414B2 (en) * | 2007-09-07 | 2012-11-06 | Deutsche Telekom Ag | Method and system for distributed, localized authentication in the framework of 802.11 |
JP2009122923A (en) * | 2007-11-14 | 2009-06-04 | Panasonic Corp | Copyright protection system, playback device, and playback method |
US8438388B2 (en) * | 2008-03-31 | 2013-05-07 | Motorola Solutions, Inc. | Method and apparatus for distributing certificate revocation lists (CRLs) to nodes in an ad hoc network |
US8452958B2 (en) * | 2010-08-31 | 2013-05-28 | Cisco Technology, Inc. | Determining certificate revocation status |
EP2858211B1 (en) * | 2012-05-29 | 2017-11-22 | Panasonic Intellectual Property Management Co., Ltd. | Apparatus, system, and method for detecting unauthorized connections of a charge/discharge device |
-
2014
- 2014-09-16 WO PCT/JP2014/004747 patent/WO2015092951A1/en active Application Filing
- 2014-09-16 JP JP2015553329A patent/JP6464511B2/en active Active
- 2014-09-16 EP EP14871128.6A patent/EP3086252B1/en active Active
-
2015
- 2015-11-02 US US14/930,034 patent/US10116454B2/en active Active
Non-Patent Citations (1)
Title |
---|
None * |
Also Published As
Publication number | Publication date |
---|---|
JPWO2015092951A1 (en) | 2017-03-16 |
JP6464511B2 (en) | 2019-02-06 |
US20170012785A1 (en) | 2017-01-12 |
EP3086252A1 (en) | 2016-10-26 |
EP3086252A4 (en) | 2016-11-23 |
WO2015092951A1 (en) | 2015-06-25 |
US10116454B2 (en) | 2018-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3086505B1 (en) | Authentication system, authentication method and authentication device | |
EP3086504B1 (en) | Administration of authentication certificates | |
EP3086252B1 (en) | Authentication system and authentication method | |
EP3086253B1 (en) | Authentication system, and authentication method | |
US9973487B2 (en) | Authentication method | |
EP1758293A1 (en) | Content providing system, information processing device, and memory card | |
WO2015004831A1 (en) | Cryptographic communication device, cryptographic communication method, and computer program therefor | |
US20140281497A1 (en) | Online personalization update system for externally acquired keys | |
EP3082057B1 (en) | Authentication method and authentication system | |
JP4918718B2 (en) | Time stamp issuing device, time stamp issuing method, and time stamp issuing program | |
US11516021B2 (en) | Information processing apparatus, communication device, and information processing system | |
US20230396614A1 (en) | Authentication-permission system, equipment, authentication-permission method, and program | |
JP2005130444A (en) | Communication apparatus, communication system, certificate transmission method and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20160607 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20161024 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 21/33 20130101ALI20161018BHEP Ipc: H04L 29/06 20060101ALI20161018BHEP Ipc: G06F 21/44 20130101AFI20161018BHEP Ipc: H04L 9/32 20060101ALI20161018BHEP |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20190211 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20191007 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1241212 Country of ref document: AT Kind code of ref document: T Effective date: 20200315 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602014061993 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200604 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200604 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200605 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200729 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200704 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R081 Ref document number: 602014061993 Country of ref document: DE Owner name: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF, US Free format text: FORMER OWNER: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD., OSAKA, JP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 1241212 Country of ref document: AT Kind code of ref document: T Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602014061993 Country of ref document: DE |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
26N | No opposition filed |
Effective date: 20201207 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20200916 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20200930 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200916 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200930 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200930 Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200916 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200916 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200930 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200930 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240918 Year of fee payment: 11 |